ISV Summer Campaign - Introduction into Unlocking your Data Summer's here and for the most of us this is the time we take that well-deserved rest and stand back a little fromthe daily grind. It's also a time for some reflection, a time to think about the things that we would like to do during the…

Blue Dot’s Advanced Mobile 311 solution is an innovative crowd-sourcing solution for Public Sector that enables citizens to quickly and easily create non-emergency Service Requests through their Smart Phones. Leveraging the power of Visual Studio 2010 Express for Windows Phone, Blue Dot has…

I've been chatting to Anthony and Jason from
iMeta Technologies Ltd who have used Silverlight to build the iMeta Agility application for managing agile/scrum development projects.The guys talk through how they came to be building on Silverlight, give a demo of the application in action and then…

Maqbool Malik and Anil Revuru (RV), from
Microsoft Information Security, talk about the newly designed version of CAT.NET which will be part of the Assessment & Protection
(A&P) suite.CAT.NET is a static analysis tool on Visual Studio that helps find vulnerabilities like SQL Injection,…

This video walks through the Contoso Partner Portal application that was developed as the reference implementation for this guidance project. We cover how to surface line of business data through the SharePoint BDC, integrate published content with LOB
data, and various ways to access and…

The third phase of the
SDL-LOB (Security Development Lifecycle for Line-of-Business applications) includes
Implementation.
Eugene Siu, from
Microsoft Information Security, describes some of the security pillars that are key in this phase, including code review, authentication, authorization…

Vineet Batta and Anil Revuru (RV), from
Microsoft Information Security, talk about the release of the new version of the Anti-XSS library, which is designed to encode output to help developers protect their ASP.NET web-based applications from cross-site scripting attacks.
They explain the new…

Andrew Law, from Microsoft Information Security, walks us through the creation of a threat model for a line-of-business application using the Threat Analysis & Modeling tool version 3.0. This screencast
includes the definition and purpose of a threat model as well as its alignment with…

SQL Detect is a SQL injection filter in real-time mode. When a request happens in the application the tool applies different heuristics to the data and tries to identify the attack. After the request is validated it proceeds.
Maqbool Malik, from
Microsoft Information Security, describes how…